Back to bug 2001002
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla | 2021-09-03 14:08:00 UTC | Pool ID | sst_security_crypto_rhel_9 | |
| Simo Sorce | 2021-09-03 14:19:15 UTC | Keywords | Rebase | |
| CC | ssorce | |||
| Simo Sorce | 2021-09-03 14:20:53 UTC | Target Release | --- | 9.0 |
| Target Milestone | rc | beta | ||
| Simo Sorce | 2021-09-03 14:21:47 UTC | Severity | unspecified | low |
| Priority | unspecified | high | ||
| Dmitry Belyavskiy | 2021-09-03 14:25:32 UTC | Doc Text | Feature: OpenSSH 8.7p1 provides experimental support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns via the shell on the remote side. SFTP support may be enabled via a temporary scp -s flag. It is intended for SFTP to become the default transfer mode in the near future, at which time the -s flag will be removed. The -O flag exists to force use of the original SCP/RCP protocol for cases where SFTP may be unavailable or incompatible. |
|
| Red Hat One Jira (issues.redhat.com) | 2021-09-03 15:31:04 UTC | Link ID | Red Hat Issue Tracker RHELPLAN-96159 | |
| Dmitry Belyavskiy | 2021-09-13 15:03:15 UTC | Doc Text | Feature: OpenSSH 8.7p1 provides experimental support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns via the shell on the remote side. SFTP support may be enabled via a temporary scp -s flag. It is intended for SFTP to become the default transfer mode in the near future, at which time the -s flag will be removed. The -O flag exists to force use of the original SCP/RCP protocol for cases where SFTP may be unavailable or incompatible. | Feature: OpenSSH 8.7p1 provides experimental support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns via the shell on the remote side. SFTP support will be enabled by default. The -O flag exists to force use of the original SCP/RCP protocol for cases where SFTP may be unavailable or incompatible. |
| Dmitry Belyavskiy | 2021-09-15 10:40:58 UTC | Doc Type | Enhancement | Release Note |
| Doc Text | Feature: OpenSSH 8.7p1 provides experimental support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns via the shell on the remote side. SFTP support will be enabled by default. The -O flag exists to force use of the original SCP/RCP protocol for cases where SFTP may be unavailable or incompatible. | Feature: OpenSSH 8.7p1 provides support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns via the shell on the remote side. SFTP support will be enabled by default. The -O flag exists to force use of the original SCP/RCP protocol for cases where SFTP may be unavailable or incompatible. |
||
| Lenka Špačková | 2021-09-15 14:44:08 UTC | Docs Contact | mjahoda | |
| Lenka Špačková | 2021-09-15 14:44:17 UTC | Doc Type | Release Note | Enhancement |
| Mirek Jahoda | 2021-10-14 10:01:37 UTC | Fixed In Version | openssh-8.7p1-1.el9 | |
| Docs Contact | mjahoda | jafiala | ||
| Stanislav Zidek | 2021-10-18 09:46:37 UTC | QA Contact | qe-baseos-security | mhavrila |
| Dmitry Belyavskiy | 2021-10-19 15:16:06 UTC | Status | NEW | MODIFIED |
| Jan Fiala | 2021-10-20 11:32:49 UTC | Flags | needinfo?(dbelyavs) | |
| Doc Text | Feature: OpenSSH 8.7p1 provides support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns via the shell on the remote side. SFTP support will be enabled by default. The -O flag exists to force use of the original SCP/RCP protocol for cases where SFTP may be unavailable or incompatible. | .OpenSSH 8.7p1 uses SFTP OpenSSH 8.7p1 provides support for transfers using the SFTP protocol as a replacement for the previously used SCP/RCP protocol. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns by the shell on the remote side. SFTP support is enabled by default. If SFTP is unavailable or incompatible in your scenario, you can use the `-O` flag to force use of the original SCP/RCP protocol. |
||
| Dmitry Belyavskiy | 2021-10-21 08:02:10 UTC | Flags | needinfo?(dbelyavs) | |
| errata-xmlrpc | 2021-10-21 14:00:59 UTC | Status | MODIFIED | ON_QA |
| Red Hat One Jira (issues.redhat.com) | 2021-11-08 10:02:23 UTC | Link ID | Red Hat Issue Tracker CRYPTO-5173 | |
| Marek Havrila | 2021-11-23 16:15:32 UTC | Status | ON_QA | VERIFIED |
| Jan Fiala | 2022-05-06 10:24:55 UTC | Doc Type | Enhancement | No Doc Update |
| Red Hat Bugzilla | 2022-05-06 10:24:55 UTC | Doc Type | No Doc Update | No Doc Update |
| Doc Text | .OpenSSH 8.7p1 uses SFTP OpenSSH 8.7p1 provides support for transfers using the SFTP protocol as a replacement for the previously used SCP/RCP protocol. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns by the shell on the remote side. SFTP support is enabled by default. If SFTP is unavailable or incompatible in your scenario, you can use the `-O` flag to force use of the original SCP/RCP protocol. | |||
| errata-xmlrpc | 2022-05-17 00:48:37 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2022-05-17 15:53:33 UTC | Resolution | --- | ERRATA |
| Status | RELEASE_PENDING | CLOSED | ||
| Last Closed | 2022-05-17 15:53:33 UTC | |||
| errata-xmlrpc | 2022-05-17 15:53:45 UTC | Link ID | Red Hat Product Errata RHBA-2022:3949 |
Back to bug 2001002